Do you have a two-tiered network - one for admin/staff; one for in-house

patron use (filtered) and then another for wireless (unfiltered or

filtered)?=20

=20

No.

=20

Do you have all staff/some staff trained in assisting patrons to setup
their

wireless PCs for the network? =20

=20

One department at the library provides limited support. None of the
other branch libraries or public services units provide any technical
support. All of that is done by central academic computing.

=20

Do you loan out equipment (laptops) to

patrons in-house; if so, how many units (fee/free.)=20

The library loans out fewer than two dozen among three locations-no
fees. Central academic computing checks out laptops at several student
computing labs (available to students only-no fees since the labs are
funded by students). Since the largest student computing lab on campus
is in the library, most library patrons check out their laptop from the
lab.

=20

If unfiltered access and patrons are using their own PCs - how do you
deal

The only difference is that if a vulnerable or compromised machine is
detected on the wireless network, the MAC address is disabled, whereas
if it is detected on the wired network, the port is disabled.

<p class=3DMsoPlainText><font size=3D2 face=3D"Courier New"><span =
style=3D'font-size:
10.0pt'>&nbsp;The library loans out fewer than two dozen among three =
locations&#8212;no
fees.&nbsp; Central academic computing checks out laptops at several =
student
computing labs (available to students only&#8212;no fees since the labs =
are
funded by students).&nbsp; Since the largest student computing lab on =
campus is
in the library, most library patrons check out their laptop from the =
lab.<o:p></o:p></span></font></p>

<p class=3DMsoPlainText><font size=3D2 face=3D"Courier New"><span =
style=3D'font-size:
10.0pt'>If unfiltered access and patrons are using their own PCs - how =
do you
deal<o:p></o:p></span></font></p>

<p class=3DMsoPlainText><font size=3D2 face=3D"Courier New"><span =
style=3D'font-size:
10.0pt'>Library staff have the authority to intervene if a patron is =
exhibiting
unruly or disruptive behavior, irrespective of whether the material =
being
viewed may be offensive to some.&nbsp; <o:p></o:p></span></font></p>

<p class=3DMsoPlainText><font size=3D2 face=3D"Courier New"><span =
style=3D'font-size:
10.0pt'>The only difference is that if a vulnerable or compromised =
machine is
detected on the wireless network, the MAC address is disabled, whereas =
if it is
detected on the wired network, the port is =
disabled.<o:p></o:p></span></font></p>